US20030101160A1 - Method for safely accessing shared storage - Google Patents

Method for safely accessing shared storage Download PDF

Info

Publication number
US20030101160A1
US20030101160A1 US09/995,028 US99502801A US2003101160A1 US 20030101160 A1 US20030101160 A1 US 20030101160A1 US 99502801 A US99502801 A US 99502801A US 2003101160 A1 US2003101160 A1 US 2003101160A1
Authority
US
United States
Prior art keywords
storage media
node
label
cluster
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/995,028
Inventor
Chandrasekharan Seetharaman
Gerrit Huizenga
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US09/995,028 priority Critical patent/US20030101160A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HUIZENGA, GERRIT, SEETHARAMAN, CHANDRASEKHARAN
Publication of US20030101160A1 publication Critical patent/US20030101160A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Definitions

  • This invention relates to accessing shared storage media in a computing environment. More specifically, the invention relates to a multinode computing environment and coordination of access to the shared storage media.
  • a storage area network (“SAN”) is an increasingly popular storage technology.
  • SAN storage area network
  • One advantage of a SAN is that it allows multiple computers to access a set of storage devices, also known as storage media.
  • storage media also known as storage media.
  • use of a SAN has an associated problem of protecting the contents of a storage media written by one node from being accidentally overwritten by a different node that can physically access the storage media. Accordingly, in a SAN it becomes important for every node to assess it's access rights before accessing the contents of the storage media.
  • a second option for protecting the shared storage media is logical isolation, as in fibre channel zoning.
  • the logical isolation option limits access to the storage media by a node and/or cluster at the hardware level.
  • One disadvantage associated with logical isolation include complex hardware associated therewith, which generally results in increased costs and complex administrative efforts that are required when changing ownership of a storage media. This option may sometimes force a reboot of the nodes.
  • Another disadvantage with logical isolation is that this form of isolation is not available for all types of storage technologies. Accordingly, the logical isolation option for protecting the shared storage media is not universally available for all storage technology and is expensive to operate.
  • a third option for protecting the shared storage media is software protection.
  • This option requires the storage media to be configured into a file system.
  • the storage media is protected by a node(s) which then acts as a master.
  • a node(s) which then acts as a master.
  • there are several limitations associated with this option including lack of raw access to the storage media and the costs associated with a master node(s).
  • the requirement that all operations be processed through the master node requires a dedication of a node as a master node.
  • the software protection is slower than the other prior art solutions. Accordingly, the software option for protecting the shared storage media is expensive and inefficient.
  • a first aspect of the invention is a method for safely accessing shared storage media in a computing environment having two or more nodes. Access rights of at least two nodes to the shared storage media are established, based in part on a hard attribute of associated storage media.
  • the hard attribute preferably comprises a hardware identifier field, and is preferably part of a label which also includes a type field, a node identifier field, and a cluster identifier field.
  • a second aspect of the invention is a computing environment having two or more nodes, shared storage media, a hard attribute on associated storage media, and an access manager responsive to the hard attribute.
  • a third aspect of the invention is an article comprising a computer-readable signal bearing medium. The article includes means in the medium for accessing shared storage media, for establishing access rights, and for managing an access request.
  • the storage media has associated storage media having a hard attribute.
  • FIG. 1 is a block diagram of a storage area network in a multinode environment.
  • FIG. 2 is a block diagram of a storage area network in a multicluster environment.
  • FIG. 3 is a block diagram of a storage area network in a multinode and multicluster environment.
  • FIG. 4 is a flow chart illustrating the process for accessing shared storage media according to the preferred embodiment of this invention, and is suggested for printing on the first page of the issued patent.
  • FIG. 5 is a flow chart illustrating the process for updating an activity counter while accessing the storage media.
  • FIG. 6 is a flow chart illustrating the process for utilizing an activity interval in conjunct ion with an activity counter for changing a storage media label.
  • a node is a computer running a single operating system instance. Each node in a computing environment is connected to a set of storage media.
  • a cluster is a set of multiple nodes coordinating access to a set of shared storage subsystems typically through a storage area network. It is important for each node in a computing environment to assess its rights to access the storage media prior to accessing the storage media. In addition, it is important for each node to ensure the coherence of updates to the storage media. Accordingly, the method disclosed herein teaches safe access of shared storage media in a multinode and/or multicluster computer operating environment.
  • FIG. 1 is a block diagram 10 of a multinode computing environment having four nodes with each node having physical access to the storage media 22 - 36 connected to the storage area network 20 .
  • Each node 12 , 14 , 16 and 18 is in communication with the storage area network 20 .
  • the system includes a plurality of storage media 22 - 36 which are also in communication with the storage area network 20 .
  • the interconnection of each of the nodes 12 , 14 , 16 and 18 with the storage area network 20 as well as the interconnection of each of the storage media 22 - 36 with the storage area network 20 , allows each of the nodes 12 , 14 , 16 and 18 to access each of the storage media 22 - 36 in the computing environment.
  • FIG. 1 is a computing environment wherein each node can access the storage media 22 - 36 through the storage area network 20 .
  • FIG. 2 is a block diagram 50 of a computing environment having two clusters 60 and 70 and a storage area network 80 .
  • the first cluster 60 includes two nodes 62 and 64
  • the second cluster 70 includes four nodes 72 , 74 , 76 and 78 .
  • Each of the clusters 60 and 70 operates as a single homogeneous cluster environment. However, in the environment shown herein both the nodes 62 and 64 in the first cluster 60 and the nodes 72 , 74 , 76 and 78 in the second cluster 70 are individually connected to the storage area network 80 .
  • the system includes a plurality of storage media 82 - 96 which are also in communication with the storage area network 80 .
  • each of the nodes in the first cluster 60 and each of the nodes in the second cluster 70 with the storage area network 80 allows each of the nodes in the clusters 60 and 70 to access each of the storage media 82 - 96 in the computing environment.
  • FIG. 3 is a block diagram 100 of a computing environment having two clusters 110 and 120 , two independent nodes 130 and 132 , and a storage area network 140 .
  • the first cluster 110 includes two nodes 112 and 114
  • the second cluster includes four nodes 122 , 124 , 126 and 128 .
  • Each of the clusters operates as a single homogeneous cluster environment.
  • the nodes in the first cluster 110 , the nodes in the second cluster 120 , and each of the independent nodes 130 and 132 are individually connected to the storage area network 140 .
  • the environment includes a plurality of storage media 142 - 156 which are also in communication with the storage area network 140 .
  • the interconnection of the nodes in the first cluster 110 , the nodes in the second cluster 120 , and both of the independent nodes 130 and 132 with the storage area network 140 , as well as the interconnection of each of the storage media 142 - 156 with the storage area network 140 , allows each of the nodes in clusters 110 and 120 and independent nodes 130 and 132 to access each of the storage media 142 - 156 in the computing environment. Accordingly, the interconnection of each independent node and each node within each cluster enables access to the storage media from any of the nodes in the computing environment.
  • FIGS. 1, 2 and 3 illustrate alternative physical configurations with interconnected nodes and/or clusters that are in communication with a storage area network.
  • the interconnection of the system in each illustrated environment allows each node to access the shared storage media.
  • FIG. 4 is a flow chart 200 illustrating the process for a node to safely access shared storage media.
  • Each storage media has a label or other indicia of identification written to associated storage media.
  • the associated storage media includes the storage media itself, flash RAM associated with a SCSI disk, storage in a RAID storage system, or any other storage which is associated with the storage media. Coherency of the label in the media is maintained by atomic read or write operations.
  • the label includes multiple fields, including a hardware identifier field or other hard attribute, a type field, a node identifier field, and a cluster identifier field.
  • the hardware identifier field originates from the manufacturer of the storage media and is typically based upon immutable properties of the media, such as a SCSI vendor and a product number and a serial number.
  • the type field is created by an operator of the storage media at the time of initialization of the media, and indicates if the storage media is node owned or cluster owned.
  • the node identifier field is a string or integer created by the operator at the time of initialization of the media and is generally indicative of the owning node for the media.
  • the cluster identifier field is a string or integer created by the operator at the time of initialization of the media and is generally indicative of the owning cluster for the media.
  • the label may include additional fields for providing enhanced access protection for the storage media. Because the label is determined in part by the hardware identification or other hard attribute, the label is unique for each storage media. The label is used to limit access to the storage media by the nodes and/or nodes in the clusters that have physical access to the media.
  • the first step in determining a node's access rights to a storage media is reading the label from the storage media 210 . Thereafter, the accessing node must obtain the hardware identifier from the storage media 212 . The accessing node must then compare the hardware identifier of the storage media with the hardware identifier field of the label 214 . If the hardware identifier of the storage media and hardware identifier field of the label do not match, then the accessing node is denied access to the storage media 216 because the label has been determined to be invalid. However, if the hardware identifier of the storage media and hardware identifier field of the label do match, then the accessing node must determine if the storage media is node owned or cluster owned 218 .
  • Each storage media will either be node-owned or cluster-owned. If the storage media is node-owned, the node identifier for the node is obtained 220 . Thereafter, a comparison of the node identifier of the node with the node identifier provided in the label is conducted 222 . If the node identifier of the node matches the node identifier provided in the label, then the accessing node is allowed access to the storage media 224 , otherwise the accessing node is denied access to the storage media 226 . Accordingly, this procedure allows safe access to the storage media only by a node owning the storage media.
  • each storage media in the system is either node-owned or cluster-owned, and is identified as such in the label of the storage media.
  • a determination of the form of ownership is conducted at step 218 . If the storage media is cluster-owned, the cluster identifier from the node is obtained 228 . Thereafter, a comparison of the cluster identifier of the node with the cluster identifier provided in the label is conducted 230 . If the cluster identifier of the node matches the cluster identifier provided in the label, then the accessing node in the cluster is allowed access to the storage media 224 , otherwise the accessing node in the cluster is denied access to the storage media 226 . Accordingly, the procedure for determining access rights of a node in a cluster to a storage media utilizes a label reflecting a unique hardware identifier or other hard attribute to ensure a node in a cluster has proper authorization for safe access to the storage media.
  • the label utilized in the procedure outline in FIG. 4 has a minimum of four fields. Each of these fields are used for determining a node's access to storage media in a storage area network. However, the label may be formatted to include additional field for additional access rights. For example, the type field may be expanded to include a combination of a cluster identifier and a node identifier. This expanded type field would limit access to the storage media to a specific node in a specific cluster.
  • a fifth field that can be added to the label is a user defined name for the storage media. This field can be used for ease in locating the storage media at the time of booting the system.
  • a sixth field that can be added to the label is an operating system defined name for the storage media.
  • the label can be expanded to include an activity counter as a seventh field and an activity interval as an eighth field.
  • the activity counter field and activity interval field can be used together to protect a storage media when an administrator from a node accidentally tries to change the ownership of the storage media which is being accessed by another node.
  • the label may be expanded to include additional fields which would provide enhanced safety features or utility when accessing storage media in a storage area network.
  • FIGS. 5 and 6 are flow diagrams 300 and 350 , respectively, illustrating the details of utilizing the supplementary activity counter field and activity interval field of the label. As explained briefly above, these two fields work in conjunction for preventing a change in storage media ownership when the storage media is in use by another node. Therefore, usage of the activity counter and activity interval fields will be illustrated with reference to two nodes, node 0 and node 1 .
  • FIG. 5 illustrates the process for node 0
  • FIG. 6 illustrates the process for node 1 .
  • node 0 prior to utilizing either of these supplementary fields, node 0 must first determine access rights to the storage media 304 , as illustrated in FIG. 4.
  • node 0 Once it has been determined that node 0 has access to the storage media, node 0 must determine the interval at which node 0 plans to update the activity counter 306 . Thereafter, node 0 reads the label of the storage media 308 . The activity counter is then changed 310 , followed by node 0 writing to the label 312 with the new activity counter value and new activity interval value of the storage media.
  • This implementation changes the activity counter for every activity interval as long as nodes is accessing the storage media. Accordingly, the process of changing the activity counter field by nodes accessing the storage media and writing the label to the storage media is indicative of use of the storage media by the owner of the storage media.
  • FIG. 6 is a flow chart 350 illustrating the process of allowing access to a shared storage media for the purpose of changing the label of the storage media by node 1 .
  • node 1 must determine access rights to the storage media 352 and ownership of the storage media prior to changing the label. If node 1 has access privileges to the storage media, it can change the contents of the label. Otherwise, if it has been determined that node 1 does not have access rights to the storage media, node 1 must determine if the desired operation of node 1 is to change the label of the storage media 354 .
  • node 1 desires to change the label of the storage media, then it proceeds to read the label and save the activity counter field from the label 356 , otherwise access to change the label is denied 358 .
  • node 1 waits for a period of at least twice the activity interval period in the label 358 plus an amount of time to compensate for discrepancies in time drift of the nodes in the SAN. Thereafter, node 1 reads the label from the storage media 360 , and compares the activity counter of the label 362 from step 356 and step 360 . If the activity counter has changed from steps 356 to 360 , access to the storage media by node 1 to change the label is denied 364 .
  • node 1 is allowed access to the storage media to change the label 366 . Accordingly, the process outlined in FIG. 6 demonstrates how a node that wants to change the label of a storage media is only allowed to make such a change if the activity counter is static.
  • the preferred embodiment of the invention provides a method for preventing unauthorized nodes and/or clusters from accessing storage media in a storage area network.
  • the method outlined in the preferred embodiment enables the storage area network to be configured with as many storage subsystems as the hardware can support.
  • the use of the hard attribute-based label for enabling safe access to the storage media protects each storage media individually.
  • Each node and/or cluster can have their own set of storage subsystems which are each individually and independently protected under the label and associated access algorithm.
  • the operator can move the media to a different physical location within the computing environment without affecting the ownership of the media.
  • Ownership of the storage media is maintained in the label and is not dependent on the hardware properties of system busses.
  • ownership of a storage media can be reassigned to a node or a cluster through software without requiring physical location of the storage media.
  • the hard attribute—preferably consisting of the hardware identifier combining the vendor number, product number and serial number integer or string—in a field of the label ensures that the label belongs to the storage media. This assists in differentiating the original storage media from a copy of the storage media when the contents of the storage media are copied in totality. Accordingly, the advantages of the use of the label in combination with the access algorithm is the maintenance of the ownership and access privileges to the storage media on the storage media itself and independent of the system in which the storage media is physically connected.
  • a method for allowing a node and/or cluster to have read and write access to the storage media may be provided. This would require defining additional fields in the label, such as a set of read cluster identifiers and a set of read node identifiers.
  • the method for allowing read and write access to the storage media may be implemented in the procedure for accessing shared storage media outlined in FIG. 4. If at step 226 access to the storage media is denied, the node and/or cluster may review whether the request to access the storage media is only for read access.
  • a positive response to this query would then require a comparison of the node identifier of the node with a list of read node identifiers in the label. If the node identifier is present in the list of read node identifiers, then access to the storage media is allowed. Otherwise, a comparison of the cluster identifier of the cluster with a list of read cluster identifiers in the label is conducted. If the cluster identifier is present in the list of read cluster identifier, then access to the storage media is allowed, otherwise access to the storage media is denied.
  • the storage media can be divided into partitions, with each partition having its own label. Therefore, each partition in a storage media can be owned by a different node and/or cluster.
  • another unique identifier can substitute for the hardware identifier as the hard attribute in the label. Accordingly, the scope of protection of this invention is limited only by the following claims and their equivalents.

Abstract

A method for accessing shared storage media in a multinode and/or multicluster computing environment is provided. Each storage media has a label for identifying ownership of the storage media, the label being based on a hard attribute which is preferably a hardware identifier containing the vendor, product, and serial number of the storage media. A node is permitted access to the storage media if a type field in the label indicates the media is node-owned and a node identifier in the label matches the node identifier of the node. Alternatively, a node in a cluster is permitted access to the storage media if a type field in the label indicates the media is cluster-owned and a cluster identifier in the label matches a cluster identifier of the node. The label may be expanded to include additional fields for other purposes.

Description

    BACKGROUND OF THE INVENTION
  • 1. Technical Field [0001]
  • This invention relates to accessing shared storage media in a computing environment. More specifically, the invention relates to a multinode computing environment and coordination of access to the shared storage media. [0002]
  • 2. Description of the Prior Art [0003]
  • A storage area network (“SAN”) is an increasingly popular storage technology. One advantage of a SAN is that it allows multiple computers to access a set of storage devices, also known as storage media. However, use of a SAN has an associated problem of protecting the contents of a storage media written by one node from being accidentally overwritten by a different node that can physically access the storage media. Accordingly, in a SAN it becomes important for every node to assess it's access rights before accessing the contents of the storage media. [0004]
  • There are several current options available for providing protection to the shared storage media in a multinode computing environment. One option is that of physical isolation. This option connects a node or cluster to the storage media only if the node or cluster has access privileges to the storage media. However, there are several disadvantages associated with this option, including cost. Physical isolation of a node or cluster does not take advantage of the physical capabilities of the SAN. Another disadvantage with physical isolation is the need to physically move the storage media in order to change accessibility to the storage subsystem. Accordingly, the physical isolation option for protecting the shared storage media is inefficient. [0005]
  • A second option for protecting the shared storage media is logical isolation, as in fibre channel zoning. The logical isolation option limits access to the storage media by a node and/or cluster at the hardware level. One disadvantage associated with logical isolation include complex hardware associated therewith, which generally results in increased costs and complex administrative efforts that are required when changing ownership of a storage media. This option may sometimes force a reboot of the nodes. Another disadvantage with logical isolation is that this form of isolation is not available for all types of storage technologies. Accordingly, the logical isolation option for protecting the shared storage media is not universally available for all storage technology and is expensive to operate. [0006]
  • Finally, a third option for protecting the shared storage media is software protection. This option requires the storage media to be configured into a file system. In this option, the storage media is protected by a node(s) which then acts as a master. However, there are several limitations associated with this option, including lack of raw access to the storage media and the costs associated with a master node(s). The requirement that all operations be processed through the master node requires a dedication of a node as a master node. In addition, the software protection is slower than the other prior art solutions. Accordingly, the software option for protecting the shared storage media is expensive and inefficient. [0007]
  • Each of the three current prior art solutions outlined above have drawbacks associated therewith. Accordingly, it is therefore desirable to provide a method for safely accessing shared storage media in a computing environment having two or more nodes and/or two or more clusters that overcomes the drawbacks of the prior art. [0008]
  • SUMMARY OF THE INVENTION
  • It is therefore an object of the invention to safely access shared storage media in a multiple operating system environment. [0009]
  • A first aspect of the invention is a method for safely accessing shared storage media in a computing environment having two or more nodes. Access rights of at least two nodes to the shared storage media are established, based in part on a hard attribute of associated storage media. The hard attribute preferably comprises a hardware identifier field, and is preferably part of a label which also includes a type field, a node identifier field, and a cluster identifier field. [0010]
  • A second aspect of the invention is a computing environment having two or more nodes, shared storage media, a hard attribute on associated storage media, and an access manager responsive to the hard attribute. A third aspect of the invention is an article comprising a computer-readable signal bearing medium. The article includes means in the medium for accessing shared storage media, for establishing access rights, and for managing an access request. The storage media has associated storage media having a hard attribute. [0011]
  • Other features and advantages of this invention will become apparent from the following detailed description of the presently preferred embodiment of the invention, taken in conjunction with the accompanying drawings.[0012]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of a storage area network in a multinode environment. [0013]
  • FIG. 2 is a block diagram of a storage area network in a multicluster environment. [0014]
  • FIG. 3 is a block diagram of a storage area network in a multinode and multicluster environment. [0015]
  • FIG. 4 is a flow chart illustrating the process for accessing shared storage media according to the preferred embodiment of this invention, and is suggested for printing on the first page of the issued patent. [0016]
  • FIG. 5 is a flow chart illustrating the process for updating an activity counter while accessing the storage media. [0017]
  • FIG. 6 is a flow chart illustrating the process for utilizing an activity interval in conjunct ion with an activity counter for changing a storage media label. [0018]
  • DESCRIPTION OF THE PREFERRED EMBODIMENT Overview
  • A node is a computer running a single operating system instance. Each node in a computing environment is connected to a set of storage media. A cluster is a set of multiple nodes coordinating access to a set of shared storage subsystems typically through a storage area network. It is important for each node in a computing environment to assess its rights to access the storage media prior to accessing the storage media. In addition, it is important for each node to ensure the coherence of updates to the storage media. Accordingly, the method disclosed herein teaches safe access of shared storage media in a multinode and/or multicluster computer operating environment. [0019]
  • Technical Background
  • FIG. 1 is a block diagram [0020] 10 of a multinode computing environment having four nodes with each node having physical access to the storage media 22-36 connected to the storage area network 20. Each node 12, 14, 16 and 18 is in communication with the storage area network 20. The system includes a plurality of storage media 22-36 which are also in communication with the storage area network 20. The interconnection of each of the nodes 12, 14, 16 and 18 with the storage area network 20, as well as the interconnection of each of the storage media 22-36 with the storage area network 20, allows each of the nodes 12, 14, 16 and 18 to access each of the storage media 22-36 in the computing environment. Accordingly, FIG. 1 is a computing environment wherein each node can access the storage media 22-36 through the storage area network 20.
  • FIG. 2 is a block diagram [0021] 50 of a computing environment having two clusters 60 and 70 and a storage area network 80. The first cluster 60 includes two nodes 62 and 64, and the second cluster 70 includes four nodes 72, 74, 76 and 78. Each of the clusters 60 and 70 operates as a single homogeneous cluster environment. However, in the environment shown herein both the nodes 62 and 64 in the first cluster 60 and the nodes 72, 74, 76 and 78 in the second cluster 70 are individually connected to the storage area network 80. In addition, the system includes a plurality of storage media 82-96 which are also in communication with the storage area network 80. The interconnection of each of the nodes in the first cluster 60 and each of the nodes in the second cluster 70 with the storage area network 80, as well as the interconnection of each of the storage media 82-96 with the storage area network, allows each of the nodes in the clusters 60 and 70 to access each of the storage media 82-96 in the computing environment.
  • FIG. 3 is a block diagram [0022] 100 of a computing environment having two clusters 110 and 120, two independent nodes 130 and 132, and a storage area network 140. The first cluster 110 includes two nodes 112 and 114, and the second cluster includes four nodes 122, 124, 126 and 128. Each of the clusters operates as a single homogeneous cluster environment. In the computing environment shown herein, the nodes in the first cluster 110, the nodes in the second cluster 120, and each of the independent nodes 130 and 132 are individually connected to the storage area network 140. In addition, the environment includes a plurality of storage media 142-156 which are also in communication with the storage area network 140. The interconnection of the nodes in the first cluster 110, the nodes in the second cluster 120, and both of the independent nodes 130 and 132 with the storage area network 140, as well as the interconnection of each of the storage media 142-156 with the storage area network 140, allows each of the nodes in clusters 110 and 120 and independent nodes 130 and 132 to access each of the storage media 142-156 in the computing environment. Accordingly, the interconnection of each independent node and each node within each cluster enables access to the storage media from any of the nodes in the computing environment.
  • FIGS. 1, 2 and [0023] 3 illustrate alternative physical configurations with interconnected nodes and/or clusters that are in communication with a storage area network. The interconnection of the system in each illustrated environment allows each node to access the shared storage media. However, in sharing storage media in each of the illustrated environments it is critical to provide safe access to the storage media. Safe access to the shared storage media ensures coherency of changes to the data stored within the media.
  • FIG. 4 is a [0024] flow chart 200 illustrating the process for a node to safely access shared storage media. Each storage media has a label or other indicia of identification written to associated storage media. The associated storage media includes the storage media itself, flash RAM associated with a SCSI disk, storage in a RAID storage system, or any other storage which is associated with the storage media. Coherency of the label in the media is maintained by atomic read or write operations. The label includes multiple fields, including a hardware identifier field or other hard attribute, a type field, a node identifier field, and a cluster identifier field. The hardware identifier field originates from the manufacturer of the storage media and is typically based upon immutable properties of the media, such as a SCSI vendor and a product number and a serial number. The type field is created by an operator of the storage media at the time of initialization of the media, and indicates if the storage media is node owned or cluster owned. The node identifier field is a string or integer created by the operator at the time of initialization of the media and is generally indicative of the owning node for the media. The cluster identifier field is a string or integer created by the operator at the time of initialization of the media and is generally indicative of the owning cluster for the media. In addition to the four identifying fields disclosed herein, the label may include additional fields for providing enhanced access protection for the storage media. Because the label is determined in part by the hardware identification or other hard attribute, the label is unique for each storage media. The label is used to limit access to the storage media by the nodes and/or nodes in the clusters that have physical access to the media.
  • As shown in FIG. 4, the first step in determining a node's access rights to a storage media is reading the label from the [0025] storage media 210. Thereafter, the accessing node must obtain the hardware identifier from the storage media 212. The accessing node must then compare the hardware identifier of the storage media with the hardware identifier field of the label 214. If the hardware identifier of the storage media and hardware identifier field of the label do not match, then the accessing node is denied access to the storage media 216 because the label has been determined to be invalid. However, if the hardware identifier of the storage media and hardware identifier field of the label do match, then the accessing node must determine if the storage media is node owned or cluster owned 218. Each storage media will either be node-owned or cluster-owned. If the storage media is node-owned, the node identifier for the node is obtained 220. Thereafter, a comparison of the node identifier of the node with the node identifier provided in the label is conducted 222. If the node identifier of the node matches the node identifier provided in the label, then the accessing node is allowed access to the storage media 224, otherwise the accessing node is denied access to the storage media 226. Accordingly, this procedure allows safe access to the storage media only by a node owning the storage media.
  • As mentioned above, each storage media in the system is either node-owned or cluster-owned, and is identified as such in the label of the storage media. A determination of the form of ownership is conducted at [0026] step 218. If the storage media is cluster-owned, the cluster identifier from the node is obtained 228. Thereafter, a comparison of the cluster identifier of the node with the cluster identifier provided in the label is conducted 230. If the cluster identifier of the node matches the cluster identifier provided in the label, then the accessing node in the cluster is allowed access to the storage media 224, otherwise the accessing node in the cluster is denied access to the storage media 226. Accordingly, the procedure for determining access rights of a node in a cluster to a storage media utilizes a label reflecting a unique hardware identifier or other hard attribute to ensure a node in a cluster has proper authorization for safe access to the storage media.
  • The label utilized in the procedure outline in FIG. 4 has a minimum of four fields. Each of these fields are used for determining a node's access to storage media in a storage area network. However, the label may be formatted to include additional field for additional access rights. For example, the type field may be expanded to include a combination of a cluster identifier and a node identifier. This expanded type field would limit access to the storage media to a specific node in a specific cluster. A fifth field that can be added to the label is a user defined name for the storage media. This field can be used for ease in locating the storage media at the time of booting the system. A sixth field that can be added to the label is an operating system defined name for the storage media. This field can be used to avoid naming conflicts of multiple media in a storage area network in a clustered environment. Finally, the label can be expanded to include an activity counter as a seventh field and an activity interval as an eighth field. The activity counter field and activity interval field can be used together to protect a storage media when an administrator from a node accidentally tries to change the ownership of the storage media which is being accessed by another node. Accordingly, the label may be expanded to include additional fields which would provide enhanced safety features or utility when accessing storage media in a storage area network. [0027]
  • FIGS. 5 and 6 are flow diagrams [0028] 300 and 350, respectively, illustrating the details of utilizing the supplementary activity counter field and activity interval field of the label. As explained briefly above, these two fields work in conjunction for preventing a change in storage media ownership when the storage media is in use by another node. Therefore, usage of the activity counter and activity interval fields will be illustrated with reference to two nodes, node0 and node1. FIG. 5 illustrates the process for node0, and FIG. 6 illustrates the process for node1. As shown in FIG. 5, prior to utilizing either of these supplementary fields, node0 must first determine access rights to the storage media 304, as illustrated in FIG. 4. Once it has been determined that node0 has access to the storage media, node0 must determine the interval at which node0 plans to update the activity counter 306. Thereafter, node0 reads the label of the storage media 308. The activity counter is then changed 310, followed by node0 writing to the label 312 with the new activity counter value and new activity interval value of the storage media. This implementation changes the activity counter for every activity interval as long as nodes is accessing the storage media. Accordingly, the process of changing the activity counter field by nodes accessing the storage media and writing the label to the storage media is indicative of use of the storage media by the owner of the storage media.
  • FIG. 6 is a [0029] flow chart 350 illustrating the process of allowing access to a shared storage media for the purpose of changing the label of the storage media by node1. As illustrated in FIG. 4, node1 must determine access rights to the storage media 352 and ownership of the storage media prior to changing the label. If node1 has access privileges to the storage media, it can change the contents of the label. Otherwise, if it has been determined that node1 does not have access rights to the storage media, node1 must determine if the desired operation of node1 is to change the label of the storage media 354. If node1 desires to change the label of the storage media, then it proceeds to read the label and save the activity counter field from the label 356, otherwise access to change the label is denied 358. Following step 356, node1 waits for a period of at least twice the activity interval period in the label 358 plus an amount of time to compensate for discrepancies in time drift of the nodes in the SAN. Thereafter, node1 reads the label from the storage media 360, and compares the activity counter of the label 362 from step 356 and step 360. If the activity counter has changed from steps 356 to 360, access to the storage media by node1 to change the label is denied 364. However, if the activity counter from steps 356 to 360 is not changed, then node1 is allowed access to the storage media to change the label 366. Accordingly, the process outlined in FIG. 6 demonstrates how a node that wants to change the label of a storage media is only allowed to make such a change if the activity counter is static.
  • Advantages Over the Prior Art
  • The preferred embodiment of the invention provides a method for preventing unauthorized nodes and/or clusters from accessing storage media in a storage area network. The method outlined in the preferred embodiment enables the storage area network to be configured with as many storage subsystems as the hardware can support. The use of the hard attribute-based label for enabling safe access to the storage media protects each storage media individually. Each node and/or cluster can have their own set of storage subsystems which are each individually and independently protected under the label and associated access algorithm. In addition, since the information pertaining to storage media ownership is stored in the media itself, the operator can move the media to a different physical location within the computing environment without affecting the ownership of the media. Ownership of the storage media is maintained in the label and is not dependent on the hardware properties of system busses. In addition, the ownership of a storage media can be reassigned to a node or a cluster through software without requiring physical location of the storage media. Finally, the hard attribute—preferably consisting of the hardware identifier combining the vendor number, product number and serial number integer or string—in a field of the label ensures that the label belongs to the storage media. This assists in differentiating the original storage media from a copy of the storage media when the contents of the storage media are copied in totality. Accordingly, the advantages of the use of the label in combination with the access algorithm is the maintenance of the ownership and access privileges to the storage media on the storage media itself and independent of the system in which the storage media is physically connected. [0030]
  • Alternative Embodiments
  • It will be appreciated that, although specific embodiments of the invention have been described herein for purposes of illustration, various modifications may be made without departing from the spirit and scope of the invention. In particular, a method for allowing a node and/or cluster to have read and write access to the storage media may be provided. This would require defining additional fields in the label, such as a set of read cluster identifiers and a set of read node identifiers. The method for allowing read and write access to the storage media may be implemented in the procedure for accessing shared storage media outlined in FIG. 4. If at [0031] step 226 access to the storage media is denied, the node and/or cluster may review whether the request to access the storage media is only for read access. A positive response to this query would then require a comparison of the node identifier of the node with a list of read node identifiers in the label. If the node identifier is present in the list of read node identifiers, then access to the storage media is allowed. Otherwise, a comparison of the cluster identifier of the cluster with a list of read cluster identifiers in the label is conducted. If the cluster identifier is present in the list of read cluster identifier, then access to the storage media is allowed, otherwise access to the storage media is denied. In addition, the storage media can be divided into partitions, with each partition having its own label. Therefore, each partition in a storage media can be owned by a different node and/or cluster. Finally, another unique identifier can substitute for the hardware identifier as the hard attribute in the label. Accordingly, the scope of protection of this invention is limited only by the following claims and their equivalents.

Claims (20)

We claim:
1. A method for safely accessing shared storage media in a computing environment having two or more nodes comprising:
(a) establishing access rights of at least two of said nodes to said storage media, said establishing access rights being responsive at least in part to a hard attribute of associated storage media; and
(b) accessing said storage media by one of said at least two of said nodes in response to said access rights.
2. The method of claim 1, wherein said hard attribute comprises a hardware identifier field, including a vendor, product, and a serial number of said storage media.
3. The method of claim 1, wherein said establishing access rights creates a label including said hard attribute, a type field, and a node identifier field.
4. The method of claim 3, further comprising the step of allowing access of a node to said storage media if said type field indicates said storage media is node-owned and said node identifier matches a node identifier of said node.
5. The method of claim 3, wherein said label further includes:
a cluster identifier field; and
further comprising the step of allowing access of a node in a cluster to said storage media if said type field indicates said storage media is cluster-owned and said cluster identifier matches a cluster identifier of said node.
6. The method of claim 3, wherein said label further includes an activity interval field and an activity counter field for protecting ownership of said storage media.
7. The method of claim 1, wherein the computing environment is a storage area network.
8. A computing environment comprising:
two or more nodes;
shared storage-media;
associated storage media having a hard attribute; and
an access manager for each of at least two of said nodes, said manager being responsive at least in part to said hard attribute.
9. The system of claim 8, wherein said hard attribute comprises a hardware identifier field, including a vendor, a product, and a serial number of said storage media.
10. The system of claim 8, wherein said access manager is responsive at least in part to a label, said label including said hard attribute, a type field, and a node identifier field.
11. The system of claim 10, further comprising a positive access response from said access manager if said type field indicates said media is node-owned and said node identifier field matches a node identifier of said node.
12. The system of claim 10, wherein said label further includes a cluster identifier field; and
further comprising a positive access response from said access manager if said type field indicates said media is cluster-owned and said cluster identifier matches a cluster identifier of said node.
13. The system of claim 10, wherein said label further comprises an activity data field and an activity counter field to protect ownership of said media.
14. An article comprising:
a computer-readable signal-bearing medium;
means in the medium for accessing shared storage media, said storage media having associated storage media having a hard attribute;
means in the medium for establishing access rights of at least two nodes to said storage media at least in part in response to said hard attribute; and
means in the medium for managing an access request to said storage media in response to said access rights.
15. The article of claim 14, wherein the medium is selected from the group consisting of: a recordable data storage medium and a modulated carrier signal.
16. The article of claim 14, wherein said managing means grants a positive access request to a node responsive to confirmation of node ownership of said media.
17. The article of claim 14, wherein said managing means grants a positive access request to a node in a cluster responsive to confirmation of cluster ownership of said media.
18. A method for safely accessing shared storage media in a computing environment having two or more nodes comprising:
(a) writing a label, said label being determined at least in part by a hardware identifier of associated storage media of said storage media, said hardware identifier including a serial number of said storage media;
(b) establishing access rights of a node to said storage media responsive to said label; and
(c) determining a node's responsibility for coordinating access to said storage media responsive to said label.
19. The method of claim 18, further comprising the step of allowing access of a node to said storage media if a type field in said label indicates said storage media is node-owned and a node identifier in said label matches a node identifier of said node.
20. The method of claim 18, further comprising the step of allowing access of a node in a cluster to said media if a type field in said label indicates said storage media is cluster-owned and a cluster identifier in said label matches a cluster identifier of said node.
US09/995,028 2001-11-26 2001-11-26 Method for safely accessing shared storage Abandoned US20030101160A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/995,028 US20030101160A1 (en) 2001-11-26 2001-11-26 Method for safely accessing shared storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/995,028 US20030101160A1 (en) 2001-11-26 2001-11-26 Method for safely accessing shared storage

Publications (1)

Publication Number Publication Date
US20030101160A1 true US20030101160A1 (en) 2003-05-29

Family

ID=25541319

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/995,028 Abandoned US20030101160A1 (en) 2001-11-26 2001-11-26 Method for safely accessing shared storage

Country Status (1)

Country Link
US (1) US20030101160A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070083725A1 (en) * 2005-10-06 2007-04-12 Microsoft Corporation Software agent-based architecture for data relocation
US20100054242A1 (en) * 2008-08-28 2010-03-04 Nokia Corporation Method, apparatus and computer program to generate a unique node identifier
CN104765572A (en) * 2015-03-25 2015-07-08 华中科技大学 Energy-saving virtual storage server system and scheduling method
CN106776454A (en) * 2008-09-19 2017-05-31 微软技术许可有限责任公司 Via the lasting resource arbitration for sharing write access for retaining
US9836340B2 (en) 2011-10-03 2017-12-05 International Business Machines Corporation Safe management of data storage using a volume manager
CN107491343A (en) * 2017-09-08 2017-12-19 中国电子科技集团公司第二十八研究所 A kind of across cluster resource scheduling system based on cloud computing
CN114374524A (en) * 2020-10-14 2022-04-19 北京金山云网络技术有限公司 Access control method and device for object storage, storage medium and electronic device
CN114826676A (en) * 2022-03-30 2022-07-29 吴银会 Network security data sharing and control method and system
US11671497B2 (en) 2018-01-18 2023-06-06 Pure Storage, Inc. Cluster hierarchy-based transmission of data to a storage node included in a storage node cluster

Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5379433A (en) * 1989-05-08 1995-01-03 Victor Company Of Japan, Ltd. Protection against unauthorized use of software recorded on recording medium
US5544353A (en) * 1993-06-14 1996-08-06 International Business Machines Corporation Distributed processing object shared resource control apparatus and method
US5828876A (en) * 1996-07-31 1998-10-27 Ncr Corporation File system for a clustered processing system
US5893086A (en) * 1997-07-11 1999-04-06 International Business Machines Corporation Parallel file system and method with extensible hashing
US5933857A (en) * 1997-04-25 1999-08-03 Hewlett-Packard Co. Accessing multiple independent microkernels existing in a globally shared memory system
US5940854A (en) * 1996-01-16 1999-08-17 International Business Machines Corporation Unique identifier for optical media
US5978811A (en) * 1992-07-29 1999-11-02 Texas Instruments Incorporated Information repository system and method for modeling data
US5999976A (en) * 1997-07-11 1999-12-07 International Business Machines Corporation Parallel file system and method with byte range API locking
US6029168A (en) * 1998-01-23 2000-02-22 Tricord Systems, Inc. Decentralized file mapping in a striped network file system in a distributed computing environment
US6038651A (en) * 1998-03-23 2000-03-14 International Business Machines Corporation SMP clusters with remote resource managers for distributing work to other clusters while reducing bus traffic to a minimum
US6151688A (en) * 1997-02-21 2000-11-21 Novell, Inc. Resource management in a clustered computer system
US6182097B1 (en) * 1998-05-21 2001-01-30 Lucent Technologies Inc. Method for characterizing and visualizing patterns of usage of a web site by network users
US6192483B1 (en) * 1997-10-21 2001-02-20 Sun Microsystems, Inc. Data integrity and availability in a distributed computer system
US6243796B1 (en) * 1996-08-05 2001-06-05 Sony Corporation Recording medium and recording or reproduction apparatus that provides protection from unauthorized use of the medium
US6243814B1 (en) * 1995-11-02 2001-06-05 Sun Microsystem, Inc. Method and apparatus for reliable disk fencing in a multicomputer system
US6343324B1 (en) * 1999-09-13 2002-01-29 International Business Machines Corporation Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices
US20020053008A1 (en) * 2000-11-02 2002-05-02 International Business Machines Corporation Verifying primary and backup copies of vital information for a processing system employing a pseudo-fixed reference identifier
US6453369B1 (en) * 1998-01-20 2002-09-17 Fujitsu Limited Access protection from unauthorized use of memory medium using identifier unique to data storage device
US20020133675A1 (en) * 2001-03-14 2002-09-19 Kabushiki Kaisha Toshiba Cluster system, memory access control method, and recording medium
US20020166002A1 (en) * 2001-05-01 2002-11-07 Tom Milner System and method for identification of devices associated with input/output paths
US6496914B1 (en) * 2001-03-22 2002-12-17 Emc Corporation Method and system for administering storage devices on a network
US20040133794A1 (en) * 2001-03-28 2004-07-08 Kocher Paul C. Self-protecting digital content
US6816948B2 (en) * 2001-06-21 2004-11-09 Hitachi, Ltd. Storage system certifying a host computer
US6845395B1 (en) * 1999-06-30 2005-01-18 Emc Corporation Method and apparatus for identifying network devices on a storage network
US6977927B1 (en) * 2000-09-18 2005-12-20 Hewlett-Packard Development Company, L.P. Method and system of allocating storage resources in a storage area network
US20060047654A1 (en) * 2004-01-08 2006-03-02 Pavel Tkachev Storage medium

Patent Citations (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5379433A (en) * 1989-05-08 1995-01-03 Victor Company Of Japan, Ltd. Protection against unauthorized use of software recorded on recording medium
US5978811A (en) * 1992-07-29 1999-11-02 Texas Instruments Incorporated Information repository system and method for modeling data
US5544353A (en) * 1993-06-14 1996-08-06 International Business Machines Corporation Distributed processing object shared resource control apparatus and method
US6243814B1 (en) * 1995-11-02 2001-06-05 Sun Microsystem, Inc. Method and apparatus for reliable disk fencing in a multicomputer system
US5940854A (en) * 1996-01-16 1999-08-17 International Business Machines Corporation Unique identifier for optical media
US5828876A (en) * 1996-07-31 1998-10-27 Ncr Corporation File system for a clustered processing system
US6243796B1 (en) * 1996-08-05 2001-06-05 Sony Corporation Recording medium and recording or reproduction apparatus that provides protection from unauthorized use of the medium
US6151688A (en) * 1997-02-21 2000-11-21 Novell, Inc. Resource management in a clustered computer system
US5933857A (en) * 1997-04-25 1999-08-03 Hewlett-Packard Co. Accessing multiple independent microkernels existing in a globally shared memory system
US5893086A (en) * 1997-07-11 1999-04-06 International Business Machines Corporation Parallel file system and method with extensible hashing
US5999976A (en) * 1997-07-11 1999-12-07 International Business Machines Corporation Parallel file system and method with byte range API locking
US6192483B1 (en) * 1997-10-21 2001-02-20 Sun Microsystems, Inc. Data integrity and availability in a distributed computer system
US6604153B2 (en) * 1998-01-20 2003-08-05 Fujitsu Limited Access protection from unauthorized use of memory medium with storage of identifier unique to memory medium in data storage device
US6453369B1 (en) * 1998-01-20 2002-09-17 Fujitsu Limited Access protection from unauthorized use of memory medium using identifier unique to data storage device
US6029168A (en) * 1998-01-23 2000-02-22 Tricord Systems, Inc. Decentralized file mapping in a striped network file system in a distributed computing environment
US6038651A (en) * 1998-03-23 2000-03-14 International Business Machines Corporation SMP clusters with remote resource managers for distributing work to other clusters while reducing bus traffic to a minimum
US6182097B1 (en) * 1998-05-21 2001-01-30 Lucent Technologies Inc. Method for characterizing and visualizing patterns of usage of a web site by network users
US6845395B1 (en) * 1999-06-30 2005-01-18 Emc Corporation Method and apparatus for identifying network devices on a storage network
US6343324B1 (en) * 1999-09-13 2002-01-29 International Business Machines Corporation Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices
US6977927B1 (en) * 2000-09-18 2005-12-20 Hewlett-Packard Development Company, L.P. Method and system of allocating storage resources in a storage area network
US20020053008A1 (en) * 2000-11-02 2002-05-02 International Business Machines Corporation Verifying primary and backup copies of vital information for a processing system employing a pseudo-fixed reference identifier
US20020133675A1 (en) * 2001-03-14 2002-09-19 Kabushiki Kaisha Toshiba Cluster system, memory access control method, and recording medium
US6496914B1 (en) * 2001-03-22 2002-12-17 Emc Corporation Method and system for administering storage devices on a network
US20040133794A1 (en) * 2001-03-28 2004-07-08 Kocher Paul C. Self-protecting digital content
US20020166002A1 (en) * 2001-05-01 2002-11-07 Tom Milner System and method for identification of devices associated with input/output paths
US6816948B2 (en) * 2001-06-21 2004-11-09 Hitachi, Ltd. Storage system certifying a host computer
US20060047654A1 (en) * 2004-01-08 2006-03-02 Pavel Tkachev Storage medium

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070083725A1 (en) * 2005-10-06 2007-04-12 Microsoft Corporation Software agent-based architecture for data relocation
US7363449B2 (en) * 2005-10-06 2008-04-22 Microsoft Corporation Software agent-based architecture for data relocation
US20100054242A1 (en) * 2008-08-28 2010-03-04 Nokia Corporation Method, apparatus and computer program to generate a unique node identifier
CN106776454A (en) * 2008-09-19 2017-05-31 微软技术许可有限责任公司 Via the lasting resource arbitration for sharing write access for retaining
US9836340B2 (en) 2011-10-03 2017-12-05 International Business Machines Corporation Safe management of data storage using a volume manager
DE102012216599B4 (en) * 2011-10-03 2017-12-21 International Business Machines Corporation Method and system for securely managing datastores using a volume manager
CN104765572A (en) * 2015-03-25 2015-07-08 华中科技大学 Energy-saving virtual storage server system and scheduling method
CN107491343A (en) * 2017-09-08 2017-12-19 中国电子科技集团公司第二十八研究所 A kind of across cluster resource scheduling system based on cloud computing
US11671497B2 (en) 2018-01-18 2023-06-06 Pure Storage, Inc. Cluster hierarchy-based transmission of data to a storage node included in a storage node cluster
US11936731B2 (en) 2018-01-18 2024-03-19 Pure Storage, Inc. Traffic priority based creation of a storage volume within a cluster of storage nodes
CN114374524A (en) * 2020-10-14 2022-04-19 北京金山云网络技术有限公司 Access control method and device for object storage, storage medium and electronic device
CN114826676A (en) * 2022-03-30 2022-07-29 吴银会 Network security data sharing and control method and system

Similar Documents

Publication Publication Date Title
US5564019A (en) Program storage device and computer program product for managing a shared direct access storage device with a fixed block architecture
US20040088513A1 (en) Controller for partition-level security and backup
KR100381503B1 (en) Management of a concurrent use license in a logically-partitioned computer
US6026402A (en) Process restriction within file system hierarchies
US7562216B2 (en) System and method for applying a file system security model to a query system
EP0613073B1 (en) Licence management mechanism for a computer system
US6564228B1 (en) Method of enabling heterogeneous platforms to utilize a universal file system in a storage area network
US6336187B1 (en) Storage system with data-dependent security
US5926810A (en) Universal schema system
US7475199B1 (en) Scalable network file system
US7353240B1 (en) Method and storage system that enable sharing files among multiple servers
US20030101200A1 (en) Distributed file sharing system and a file access control method of efficiently searching for access rights
US7325017B2 (en) Method of implementation of data storage quota
WO1998022892A1 (en) Structured data storage using globally addressable memory
JPH0883253A (en) Method and device for virtual space management
US5432929A (en) Storage subsystem having a modifiable key-lock
Stonebraker Virtual memory transaction management
US20030101160A1 (en) Method for safely accessing shared storage
US7444349B1 (en) Control of concurrent access to a partitioned data file
WO1999008173A2 (en) Object oriented data storage device
US5940869A (en) System and method for providing shared memory using shared virtual segment identification in a computer system
US7844833B2 (en) Method and system for user protected media pool
JPH10105342A (en) Flexible mount and unmount for freely user-attachable/ detachable medium
WO1999009479A1 (en) Redundancy implementation on object oriented data storage device
US9111114B1 (en) Method of transforming database system privileges to object privileges

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SEETHARAMAN, CHANDRASEKHARAN;HUIZENGA, GERRIT;REEL/FRAME:012329/0987

Effective date: 20011126

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION